Loading ...

Play interactive tourEdit tour

Analysis Report PO#4018-308875.pdf.exe

Overview

General Information

Sample Name:PO#4018-308875.pdf.exe
Analysis ID:343937
MD5:ea28f2d01808072dbe45804f514ef905
SHA1:771ff981d42d6c7fc3550de8cb109e3311b0e0fa
SHA256:618d343a6d7f54a0bfd917555c79c6a777b10a35fc2da0d75f6d85354de40637
Tags:exeNanoCore

Most interesting Screenshot:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected Nanocore Rat
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: NanoCore
Yara detected AntiVM_3
Yara detected Nanocore RAT
.NET source code contains potential unpacker
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Uses an obfuscated file name to hide its real file extension (double extension)
Uses dynamic DNS services
Writes to foreign memory regions
Antivirus or Machine Learning detection for unpacked file
Contains capabilities to detect virtual machines
Contains functionality to launch a process as a different user
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
IP address seen in connection with other malware
Installs a raw input device (often for capturing keystrokes)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Uses reg.exe to modify the Windows registry
Yara signature match

Classification

Startup

  • System is w10x64
  • PO#4018-308875.pdf.exe (PID: 6520 cmdline: 'C:\Users\user\Desktop\PO#4018-308875.pdf.exe' MD5: EA28F2D01808072DBE45804F514EF905)
    • cmd.exe (PID: 6608 cmdline: 'cmd.exe' /c REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'kolkmjnhgf' /t REG_SZ /d 'C:\Users\user\AppData\Roaming\tgfcdsxazs.exe' MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • conhost.exe (PID: 6616 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • reg.exe (PID: 6656 cmdline: REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'kolkmjnhgf' /t REG_SZ /d 'C:\Users\user\AppData\Roaming\tgfcdsxazs.exe' MD5: CEE2A7E57DF2A159A065A34913A055C2)
    • tgfcdsxazs.exe (PID: 6660 cmdline: 'C:\Users\user\AppData\Roaming\tgfcdsxazs.exe' MD5: EA28F2D01808072DBE45804F514EF905)
      • InstallUtil.exe (PID: 3888 cmdline: C:\Users\user\AppData\Local\Temp\InstallUtil.exe MD5: EFEC8C379D165E3F33B536739AEE26A3)
  • cleanup

Malware Configuration

Threatname: NanoCore

{"C2: ": ["185.162.88.26", "185.162.88.26:2091"], "Version: ": "NanoCore Client, Version=1.2.2.0"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000000.00000002.356654386.0000000004301000.00000004.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0x6124f:$x1: NanoCore.ClientPluginHost
  • 0x93e2f:$x1: NanoCore.ClientPluginHost
  • 0xc69ff:$x1: NanoCore.ClientPluginHost
  • 0xf95bd:$x1: NanoCore.ClientPluginHost
  • 0x6128c:$x2: IClientNetworkHost
  • 0x93e6c:$x2: IClientNetworkHost
  • 0xc6a3c:$x2: IClientNetworkHost
  • 0xf95fa:$x2: IClientNetworkHost
  • 0x64dbf:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
  • 0x9799f:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
  • 0xca56f:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
  • 0xfd12d:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
00000000.00000002.356654386.0000000004301000.00000004.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    00000000.00000002.356654386.0000000004301000.00000004.00000001.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
    • 0x60fb7:$a: NanoCore
    • 0x60fc7:$a: NanoCore
    • 0x611fb:$a: NanoCore
    • 0x6120f:$a: NanoCore
    • 0x6124f:$a: NanoCore
    • 0x93b97:$a: NanoCore
    • 0x93ba7:$a: NanoCore
    • 0x93ddb:$a: NanoCore
    • 0x93def:$a: NanoCore
    • 0x93e2f:$a: NanoCore
    • 0xc6767:$a: NanoCore
    • 0xc6777:$a: NanoCore
    • 0xc69ab:$a: NanoCore
    • 0xc69bf:$a: NanoCore
    • 0xc69ff:$a: NanoCore
    • 0xf9325:$a: NanoCore
    • 0xf9335:$a: NanoCore
    • 0xf9569:$a: NanoCore
    • 0xf957d:$a: NanoCore
    • 0xf95bd:$a: NanoCore
    • 0x61016:$b: ClientPlugin
    00000018.00000002.687092112.0000000000392000.00000040.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0xff8d:$x1: NanoCore.ClientPluginHost
    • 0xffca:$x2: IClientNetworkHost
    • 0x13afd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
    00000018.00000002.687092112.0000000000392000.00000040.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
      Click to see the 21 entries

      Unpacked PEs

      SourceRuleDescriptionAuthorStrings
      24.2.InstallUtil.exe.5150000.5.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0xf7ad:$x1: NanoCore.ClientPluginHost
      • 0xf7da:$x2: IClientNetworkHost
      24.2.InstallUtil.exe.5150000.5.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
      • 0xf7ad:$x2: NanoCore.ClientPluginHost
      • 0x10888:$s4: PipeCreated
      • 0xf7c7:$s5: IClientLoggingHost
      24.2.InstallUtil.exe.5150000.5.raw.unpackJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
        24.2.InstallUtil.exe.4f70000.3.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
        • 0xe75:$x1: NanoCore.ClientPluginHost
        • 0xe8f:$x2: IClientNetworkHost
        24.2.InstallUtil.exe.4f70000.3.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
        • 0xe75:$x2: NanoCore.ClientPluginHost
        • 0x1261:$s3: PipeExists
        • 0x1136:$s4: PipeCreated
        • 0xeb0:$s5: IClientLoggingHost
        Click to see the 7 entries

        Sigma Overview

        System Summary:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\AppData\Local\Temp\InstallUtil.exe, ProcessId: 3888, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        Signature Overview

        Click to jump to signature section

        Show All Signature Results

        AV Detection:

        barindex
        Found malware configurationShow sources
        Source: InstallUtil.exe.3888.24.memstrMalware Configuration Extractor: NanoCore {"C2: ": ["185.162.88.26", "185.162.88.26:2091"], "Version: ": "NanoCore Client, Version=1.2.2.0"}
        Multi AV Scanner detection for dropped fileShow sources
        Source: C:\Users\user\AppData\Roaming\tgfcdsxazs.exeMetadefender: Detection: 27%Perma Link
        Source: C:\Users\user\AppData\Roaming\tgfcdsxazs.exeReversingLabs: Detection: 67%
        Multi AV Scanner detection for submitted fileShow sources
        Source: PO#4018-308875.pdf.exeMetadefender: Detection: 27%Perma Link
        Source: PO#4018-308875.pdf.exeReversingLabs: Detection: 67%
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 00000000.00000002.356654386.0000000004301000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000018.00000002.687092112.0000000000392000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000018.00000002.697259526.0000000005150000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000018.00000002.694427019.0000000003759000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000014.00000002.696946485.0000000004B14000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000014.00000002.696822953.0000000004A81000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: PO#4018-308875.pdf.exe PID: 6520, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 3888, type: MEMORY
        Source: Yara matchFile source: 24.2.InstallUtil.exe.5150000.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 24.2.InstallUtil.exe.390000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 24.2.InstallUtil.exe.5150000.5.unpack, type: UNPACKEDPE
        Source: 24.2.InstallUtil.exe.5150000.5.unpackAvira: Label: TR/NanoCore.fadte
        Source: 24.2.InstallUtil.exe.390000.1.unpackAvira: Label: TR/Dropper.MSIL.Gen7

        Compliance:

        barindex
        Uses 32bit PE filesShow sources
        Source: PO#4018-308875.pdf.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
        Contains modern PE file flags such as dynamic base (ASLR) or NXShow sources
        Source: PO#4018-308875.pdf.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
        Binary contains paths to debug symbolsShow sources
        Source: Binary string: InstallUtil.pdb\rvr hr_CorExeMainmscoree.dll source: InstallUtil.exe, 00000018.00000000.431784367.00000000002C2000.00000002.00020000.sdmp, InstallUtil.exe.0.dr
        Source: Binary string: InstallUtil.pdb source: InstallUtil.exe, InstallUtil.exe.0.dr
        Source: C:\Users\user\Desktop\PO#4018-308875.pdf.exeCode function: 4x nop then mov esp, ebp
        Source: C:\Users\user\Desktop\PO#4018-308875.pdf.exeCode function: 4x nop then push dword ptr [ebp-24h]
        Source: C:\Users\user\Desktop\PO#4018-308875.pdf.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 7FFFFFFFh
        Source: C:\Users\user\Desktop\PO#4018-308875.pdf.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h
        Source: C:\Users\user\Desktop\PO#4018-308875.pdf.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h
        Source: C:\Users\user\Desktop\PO#4018-308875.pdf.exeCode function: 4x nop then push dword ptr [ebp-20h]
        Source: C:\Users\user\Desktop\PO#4018-308875.pdf.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 7FFFFFFFh
        Source: C:\Users\user\Desktop\PO#4018-308875.pdf.exeCode function: 4x nop then jmp 05952056h
        Source: C:\Users\user\Desktop\PO#4018-308875.pdf.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h
        Source: C:\Users\user\Desktop\PO#4018-308875.pdf.exeCode function: 4x nop then lea esp, dword ptr [ebp-08h]
        Source: C:\Users\user\Desktop\PO#4018-308875.pdf.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h
        Source: C:\Users\user\Desktop\PO#4018-308875.pdf.exeCode function: 4x nop then push dword ptr [ebp-24h]
        Source: C:\Users\user\Desktop\PO#4018-308875.pdf.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 7FFFFFFFh
        Source: C:\Users\user\Desktop\PO#4018-308875.pdf.exeCode function: 4x nop then xor edx, edx
        Source: C:\Users\user\Desktop\PO#4018-308875.pdf.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h
        Source: C:\Users\user\Desktop\PO#4018-308875.pdf.exeCode function: 4x nop then xor edx, edx
        Source: C:\Users\user\Desktop\PO#4018-308875.pdf.exeCode function: 4x nop then push dword ptr [ebp-20h]
        Source: C:\Users\user\Desktop\PO#4018-308875.pdf.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 7FFFFFFFh
        Source: C:\Users\user\AppData\Roaming\tgfcdsxazs.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h
        Source: C:\Users\user\AppData\Roaming\tgfcdsxazs.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h
        Source: C:\Users\user\AppData\Roaming\tgfcdsxazs.exeCode function: 4x nop then push dword ptr [ebp-24h]
        Source: C:\Users\user\AppData\Roaming\tgfcdsxazs.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 7FFFFFFFh
        Source: C:\Users\user\AppData\Roaming\tgfcdsxazs.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h
        Source: C:\Users\user\AppData\Roaming\tgfcdsxazs.exeCode function: 4x nop then push dword ptr [ebp-20h]
        Source: C:\Users\user\AppData\Roaming\tgfcdsxazs.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 7FFFFFFFh
        Source: C:\Users\user\AppData\Roaming\tgfcdsxazs.exeCode function: 4x nop then jmp 07CA2056h
        Source: C:\Users\user\AppData\Roaming\tgfcdsxazs.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h
        Source: C:\Users\user\AppData\Roaming\tgfcdsxazs.exeCode function: 4x nop then push dword ptr [ebp-24h]
        Source: C:\Users\user\AppData\Roaming\tgfcdsxazs.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 7FFFFFFFh
        Source: C:\Users\user\AppData\Roaming\tgfcdsxazs.exeCode function: 4x nop then xor edx, edx
        Source: C:\Users\user\AppData\Roaming\tgfcdsxazs.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h
        Source: C:\Users\user\AppData\Roaming\tgfcdsxazs.exeCode function: 4x nop then xor edx, edx
        Source: C:\Users\user\AppData\Roaming\tgfcdsxazs.exeCode function: 4x nop then push dword ptr [ebp-20h]
        Source: C:\Users\user\AppData\Roaming\tgfcdsxazs.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 7FFFFFFFh

        Networking:

        barindex
        C2 URLs / IPs found in malware configurationShow sources
        Source: Malware configuration extractorIPs: 185.162.88.26
        Source: Malware configuration extractorIPs: 185.162.88.26:2091
        Uses dynamic DNS servicesShow sources
        Source: unknownDNS query: name: fenixalec.ddns.net
        Source: global trafficTCP traffic: 192.168.2.5:49737 -> 185.162.88.26:20911
        Source: Joe Sandbox ViewIP Address: 185.162.88.26 185.162.88.26
        Source: Joe Sandbox ViewASN Name: AS40676US AS40676US
        Source: unknownDNS traffic detected: queries for: fenixalec.ddns.net
        Source: tgfcdsxazs.exe, 00000014.00000002.688965801.0000000001789000.00000004.00000040.sdmpString found in binary or memory: http://iptc.tc4xmp
        Source: tgfcdsxazs.exe, 00000014.00000002.688965801.0000000001789000.00000004.00000040.sdmpString found in binary or memory: http://ns.ado/Ident
        Source: InstallUtil.exe, 00000018.00000002.694427019.0000000003759000.00000004.00000001.sdmpBinary or memory string: RegisterRawInputDevices

        E-Banking Fraud:

        barindex
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 00000000.00000002.356654386.0000000004301000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000018.00000002.687092112.0000000000392000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000018.00000002.697259526.0000000005150000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000018.00000002.694427019.0000000003759000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000014.00000002.696946485.0000000004B14000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000014.00000002.696822953.0000000004A81000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: PO#4018-308875.pdf.exe PID: 6520, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 3888, type: MEMORY
        Source: Yara matchFile source: 24.2.InstallUtil.exe.5150000.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 24.2.InstallUtil.exe.390000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 24.2.InstallUtil.exe.5150000.5.unpack, type: UNPACKEDPE

        System Summary:

        barindex
        Malicious sample detected (through community Yara rule)Show sources
        Source: 00000000.00000002.356654386.0000000004301000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000000.00000002.356654386.0000000004301000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000018.00000002.687092112.0000000000392000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000018.00000002.687092112.0000000000392000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000018.00000002.697105456.0000000004F70000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000018.00000002.697259526.0000000005150000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000018.00000002.694427019.0000000003759000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000014.00000002.696946485.0000000004B14000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000014.00000002.696946485.0000000004B14000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000014.00000002.696822953.0000000004A81000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000014.00000002.696822953.0000000004A81000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: PO#4018-308875.pdf.exe PID: 6520, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: PO#4018-308875.pdf.exe PID: 6520, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: InstallUtil.exe PID: 3888, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: InstallUtil.exe PID: 3888, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 24.2.InstallUtil.exe.5150000.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 24.2.InstallUtil.exe.4f70000.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 24.2.InstallUtil.exe.390000.1.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 24.2.InstallUtil.exe.390000.1.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 24.2.InstallUtil.exe.5150000.5.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Initial sample is a PE file and has a suspicious nameShow sources
        Source: initial sampleStatic PE information: Filename: PO#4018-308875.pdf.exe
        Source: initial sampleStatic PE information: Filename: PO#4018-308875.pdf.exe
        Source: C:\Users\user\AppData\Roaming\tgfcdsxazs.exeCode function: 20_2_057C51D8 CreateProcessAsUserW,
        Source: C:\Users\user\Desktop\PO#4018-308875.pdf.exeCode function: 0_2_0317DB41
        Source: C:\Users\user\Desktop\PO#4018-308875.pdf.exeCode function: 0_2_03171A3B
        Source: C:\Users\user\Desktop\PO#4018-308875.pdf.exeCode function: 0_2_0317B918
        Source: C:\Users\user\Desktop\PO#4018-308875.pdf.exeCode function: 0_2_031709A0
        Source: C:\Users\user\Desktop\PO#4018-308875.pdf.exeCode function: 0_2_03175800
        Source: C:\Users\user\Desktop\PO#4018-308875.pdf.exeCode function: 0_2_0317B051
        Source: C:\Users\user\Desktop\PO#4018-308875.pdf.exeCode function: 0_2_03178F30
        Source: C:\Users\user\Desktop\PO#4018-308875.pdf.exeCode function: 0_2_031737D0
        Source: C:\Users\user\Desktop\PO#4018-308875.pdf.exeCode function: 0_2_03175E28
        Source: C:\Users\user\Desktop\PO#4018-308875.pdf.exeCode function: 0_2_0317C40F
        Source: C:\Users\user\Desktop\PO#4018-308875.pdf.exeCode function: 0_2_0595D5B8
        Source: C:\Users\user\Desktop\PO#4018-308875.pdf.exeCode function: 0_2_05952080
        Source: C:\Users\user\Desktop\PO#4018-308875.pdf.exeCode function: 0_2_05950040
        Source: C:\Users\user\Desktop\PO#4018-308875.pdf.exeCode function: 0_2_05957E30
        Source: C:\Users\user\Desktop\PO#4018-308875.pdf.exeCode function: 0_2_05951881
        Source: C:\Users\user\Desktop\PO#4018-308875.pdf.exeCode function: 0_2_0595D5A8
        Source: C:\Users\user\Desktop\PO#4018-308875.pdf.exeCode function: 0_2_059574BB
        Source: C:\Users\user\Desktop\PO#4018-308875.pdf.exeCode function: 0_2_059574C8
        Source: C:\Users\user\Desktop\PO#4018-308875.pdf.exeCode function: 0_2_0595E0C8
        Source: C:\Users\user\Desktop\PO#4018-308875.pdf.exeCode function: 0_2_05950006
        Source: C:\Users\user\Desktop\PO#4018-308875.pdf.exeCode function: 0_2_05952070
        Source: C:\Users\user\AppData\Roaming\tgfcdsxazs.exeCode function: 20_2_02FCDB41
        Source: C:\Users\user\AppData\Roaming\tgfcdsxazs.exeCode function: 20_2_02FCB051
        Source: C:\Users\user\AppData\Roaming\tgfcdsxazs.exeCode function: 20_2_02FC5800
        Source: C:\Users\user\AppData\Roaming\tgfcdsxazs.exeCode function: 20_2_02FC09A0
        Source: C:\Users\user\AppData\Roaming\tgfcdsxazs.exeCode function: 20_2_02FCB918
        Source: C:\Users\user\AppData\Roaming\tgfcdsxazs.exeCode function: 20_2_02FC5E28
        Source: C:\Users\user\AppData\Roaming\tgfcdsxazs.exeCode function: 20_2_02FC37D0
        Source: C:\Users\user\AppData\Roaming\tgfcdsxazs.exeCode function: 20_2_02FC8F30
        Source: C:\Users\user\AppData\Roaming\tgfcdsxazs.exeCode function: 20_2_02FCC40F
        Source: C:\Users\user\AppData\Roaming\tgfcdsxazs.exeCode function: 20_2_057C6D30
        Source: C:\Users\user\AppData\Roaming\tgfcdsxazs.exeCode function: 20_2_057C0040
        Source: C:\Users\user\AppData\Roaming\tgfcdsxazs.exeCode function: 20_2_057C4038
        Source: C:\Users\user\AppData\Roaming\tgfcdsxazs.exeCode function: 20_2_057C1B00
        Source: C:\Users\user\AppData\Roaming\tgfcdsxazs.exeCode function: 20_2_057C2230
        Source: C:\Users\user\AppData\Roaming\tgfcdsxazs.exeCode function: 20_2_057C7960
        Source: C:\Users\user\AppData\Roaming\tgfcdsxazs.exeCode function: 20_2_057C3810
        Source: C:\Users\user\AppData\Roaming\tgfcdsxazs.exeCode function: 20_2_057C0011
        Source: C:\Users\user\AppData\Roaming\tgfcdsxazs.exeCode function: 20_2_057C3800
        Source: C:\Users\user\AppData\Roaming\tgfcdsxazs.exeCode function: 20_2_057C5BE8
        Source: C:\Users\user\AppData\Roaming\tgfcdsxazs.exeCode function: 20_2_057C3398
        Source: C:\Users\user\AppData\Roaming\tgfcdsxazs.exeCode function: 20_2_057C2220
        Source: C:\Users\user\AppData\Roaming\tgfcdsxazs.exeCode function: 20_2_057C1AF1
        Source: C:\Users\user\AppData\Roaming\tgfcdsxazs.exeCode function: 20_2_057C4AE8
        Source: C:\Users\user\AppData\Roaming\tgfcdsxazs.exeCode function: 20_2_07CAF688
        Source: C:\Users\user\AppData\Roaming\tgfcdsxazs.exeCode function: 20_2_07CAE19F
        Source: C:\Users\user\AppData\Roaming\tgfcdsxazs.exeCode function: 20_2_07CAD160
        Source: C:\Users\user\AppData\Roaming\tgfcdsxazs.exeCode function: 20_2_07CA2080
        Source: C:\Users\user\AppData\Roaming\tgfcdsxazs.exeCode function: 20_2_07CA0040
        Source: C:\Users\user\AppData\Roaming\tgfcdsxazs.exeCode function: 20_2_07CA7E60
        Source: C:\Users\user\AppData\Roaming\tgfcdsxazs.exeCode function: 20_2_07CAECA0
        Source: C:\Users\user\AppData\Roaming\tgfcdsxazs.exeCode function: 20_2_07CA1881
        Source: C:\Users\user\AppData\Roaming\tgfcdsxazs.exeCode function: 20_2_07CA74C8
        Source: C:\Users\user\AppData\Roaming\tgfcdsxazs.exeCode function: 20_2_07CA74B9
        Source: C:\Users\user\AppData\Roaming\tgfcdsxazs.exeCode function: 20_2_07CAD150
        Source: C:\Users\user\AppData\Roaming\tgfcdsxazs.exeCode function: 20_2_07CA2070
        Source: C:\Users\user\AppData\Roaming\tgfcdsxazs.exeCode function: 20_2_07CA003A
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeCode function: 24_2_002C20B0
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeCode function: 24_2_0267E473
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeCode function: 24_2_0267E480
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeCode function: 24_2_0267BBD4
        Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\InstallUtil.exe 46DEE184523A584E56DF93389F81992911A1BA6B1F05AD7D803C6AB1450E18CB
        Source: PO#4018-308875.pdf.exeBinary or memory string: OriginalFilename vs PO#4018-308875.pdf.exe
        Source: PO#4018-308875.pdf.exe, 00000000.00000002.356654386.0000000004301000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSHCore1.dll0 vs PO#4018-308875.pdf.exe
        Source: PO#4018-308875.pdf.exe, 00000000.00000002.360758846.00000000059F0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameKernelbase.dll.muij% vs PO#4018-308875.pdf.exe
        Source: PO#4018-308875.pdf.exe, 00000000.00000002.360519336.0000000005980000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemscorrc.dllT vs PO#4018-308875.pdf.exe
        Source: PO#4018-308875.pdf.exe, 00000000.00000002.362597582.0000000006090000.00000002.00000001.sdmpBinary or memory string: System.OriginalFileName vs PO#4018-308875.pdf.exe
        Source: PO#4018-308875.pdf.exeBinary or memory string: OriginalFilenamewebapp-uninstaller.exen' vs PO#4018-308875.pdf.exe
        Source: PO#4018-308875.pdf.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
        Source: unknownProcess created: C:\Windows\SysWOW64\reg.exe REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'kolkmjnhgf' /t REG_SZ /d 'C:\Users\user\AppData\Roaming\tgfcdsxazs.exe'
        Source: 00000000.00000002.356654386.0000000004301000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000000.00000002.356654386.0000000004301000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000018.00000002.687092112.0000000000392000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000018.00000002.687092112.0000000000392000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000018.00000002.697105456.0000000004F70000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000018.00000002.697105456.0000000004F70000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 00000018.00000002.697259526.0000000005150000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000018.00000002.697259526.0000000005150000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 00000018.00000002.694427019.0000000003759000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000014.00000002.696946485.0000000004B14000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000014.00000002.696946485.0000000004B14000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000014.00000002.696822953.0000000004A81000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000014.00000002.696822953.0000000004A81000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: PO#4018-308875.pdf.exe PID: 6520, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: PO#4018-308875.pdf.exe PID: 6520, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: InstallUtil.exe PID: 3888, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: InstallUtil.exe PID: 3888, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 24.2.InstallUtil.exe.5150000.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 24.2.InstallUtil.exe.5150000.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 24.2.InstallUtil.exe.4f70000.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 24.2.InstallUtil.exe.4f70000.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 24.2.InstallUtil.exe.390000.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 24.2.InstallUtil.exe.390000.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 24.2.InstallUtil.exe.390000.1.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 24.2.InstallUtil.exe.5150000.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 24.2.InstallUtil.exe.5150000.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 24.2.InstallUtil.exe.390000.1.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: 24.2.InstallUtil.exe.390000.1.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
        Source: 24.2.InstallUtil.exe.390000.1.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
        Source: classification engineClassification label: mal100.troj.evad.winEXE@10/5@12/3
        Source: C:\Users\user\Desktop\PO#4018-308875.pdf.exeFile created: C:\Users\user\AppData\Roaming\tgfcdsxazs.exeJump to behavior
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6616:120:WilError_01
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{4c844ad7-de78-4c04-815b-d468ebb89811}
        Source: C:\Users\user\Desktop\PO#4018-308875.pdf.exeFile created: C:\Users\user\AppData\Local\Temp\InstallUtil.exeJump to behavior
        Source: PO#4018-308875.pdf.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: C:\Users\user\Desktop\PO#4018-308875.pdf.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Users\user\AppData\Roaming\tgfcdsxazs.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Users\user\Desktop\PO#4018-308875.pdf.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
        Source: C:\Users\user\Desktop\PO#4018-308875.pdf.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
        Source: PO#4018-308875.pdf.exeMetadefender: Detection: 27%
        Source: PO#4018-308875.pdf.exeReversingLabs: Detection: 67%
        Source: C:\Users\user\Desktop\PO#4018-308875.pdf.exeFile read: C:\Users\user\Desktop\PO#4018-308875.pdf.exeJump to behavior
        Source: unknownProcess created: C:\Users\user\Desktop\PO#4018-308875.pdf.exe 'C:\Users\user\Desktop\PO#4018-308875.pdf.exe'
        Source: unknownProcess created: C:\Windows\SysWOW64\cmd.exe 'cmd.exe' /c REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'kolkmjnhgf' /t REG_SZ /d 'C:\Users\user\AppData\Roaming\tgfcdsxazs.exe'
        Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: unknownProcess created: C:\Windows\SysWOW64\reg.exe REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'kolkmjnhgf' /t REG_SZ /d 'C:\Users\user\AppData\Roaming\tgfcdsxazs.exe'
        Source: unknownProcess created: C:\Users\user\AppData\Roaming\tgfcdsxazs.exe 'C:\Users\user\AppData\Roaming\tgfcdsxazs.exe'
        Source: unknownProcess created: C:\Users\user\AppData\Local\Temp\InstallUtil.exe C:\Users\user\AppData\Local\Temp\InstallUtil.exe
        Source: C:\Users\user\Desktop\PO#4018-308875.pdf.exeProcess created: C:\Windows\SysWOW64\cmd.exe 'cmd.exe' /c REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'kolkmjnhgf' /t REG_SZ /d 'C:\Users\user\AppData\Roaming\tgfcdsxazs.exe'
        Source: C:\Users\user\Desktop\PO#4018-308875.pdf.exeProcess created: C:\Users\user\AppData\Roaming\tgfcdsxazs.exe 'C:\Users\user\AppData\Roaming\tgfcdsxazs.exe'
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'kolkmjnhgf' /t REG_SZ /d 'C:\Users\user\AppData\Roaming\tgfcdsxazs.exe'
        Source: C:\Users\user\AppData\Roaming\tgfcdsxazs.exeProcess created: C:\Users\user\AppData\Local\Temp\InstallUtil.exe C:\Users\user\AppData\Local\Temp\InstallUtil.exe
        Source: C:\Users\user\Desktop\PO#4018-308875.pdf.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32
        Source: C:\Users\user\Desktop\PO#4018-308875.pdf.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
        Source: PO#4018-308875.pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
        Source: PO#4018-308875.pdf.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
        Source: Binary string: InstallUtil.pdb\rvr hr_CorExeMainmscoree.dll source: InstallUtil.exe, 00000018.00000000.431784367.00000000002C2000.00000002.00020000.sdmp, InstallUtil.exe.0.dr
        Source: Binary string: InstallUtil.pdb source: InstallUtil.exe, InstallUtil.exe.0.dr

        Data Obfuscation:

        barindex
        .NET source code contains potential unpackerShow sources
        Source: 24.2.InstallUtil.exe.390000.1.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 24.2.InstallUtil.exe.390000.1.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: C:\Users\user\Desktop\PO#4018-308875.pdf.exeCode function: 0_2_00E98C70 push ebx; ret
        Source: C:\Users\user\Desktop\PO#4018-308875.pdf.exeCode function: 0_2_00E9835D push cs; retf
        Source: C:\Users\user\Desktop\PO#4018-308875.pdf.exeCode function: 0_2_00E8230D push ebp; iretd
        Source: C:\Users\user\AppData\Roaming\tgfcdsxazs.exeCode function: 20_2_00CE835D push cs; retf
        Source: C:\Users\user\AppData\Roaming\tgfcdsxazs.exeCode function: 20_2_00CE8C70 push ebx; ret
        Source: C:\Users\user\AppData\Roaming\tgfcdsxazs.exeCode function: 20_2_00CD230D push ebp; iretd
        Source: C:\Users\user\AppData\Roaming\tgfcdsxazs.exeCode function: 20_2_057C909E push 8B45EB68h; iretd
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeCode function: 24_2_0267E0F0 push edx; ret
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeCode function: 24_2_0267E36F push edx; ret
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeCode function: 24_2_0267E373 push edx; ret
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeCode function: 24_2_0267E349 push edx; ret
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeCode function: 24_2_0267E0E7 push ecx; ret
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeCode function: 24_2_0267E0E3 push ecx; ret
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeCode function: 24_2_0267E0D8 push ecx; ret
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeCode function: 24_2_0267E471 push ebx; ret
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeCode function: 24_2_02678A61 push ss; ret
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeCode function: 24_2_0267EDEF push edi; ret
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeCode function: 24_2_0267EDF7 push edi; ret
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeCode function: 24_2_0267EDF3 push edi; ret
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeCode function: 24_2_0267EDB9 push esi; ret
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeCode function: 24_2_0267ED89 push esi; ret
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeCode function: 24_2_026793D9 push ds; ret
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeCode function: 24_2_02679660 push ds; ret
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeCode function: 24_2_026796C7 push ds; ret
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeCode function: 24_2_0267F798 pushad ; ret
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeCode function: 24_2_02677A71 push cs; ret
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeCode function: 24_2_02677A80 push cs; ret
        Source: 24.2.InstallUtil.exe.390000.1.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: 24.2.InstallUtil.exe.390000.1.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: C:\Users\user\Desktop\PO#4018-308875.pdf.exeFile created: C:\Users\user\AppData\Roaming\tgfcdsxazs.exeJump to dropped file
        Source: C:\Users\user\Desktop\PO#4018-308875.pdf.exeFile created: C:\Users\user\AppData\Local\Temp\InstallUtil.exeJump to dropped file
        Source: C:\Windows\SysWOW64\reg.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run kolkmjnhgfJump to behavior
        Source: C:\Windows\SysWOW64\reg.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run kolkmjnhgfJump to behavior

        Hooking and other Techniques for Hiding and Protection:

        barindex
        Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
        Source: C:\Users\user\Desktop\PO#4018-308875.pdf.exeFile opened: C:\Users\user\Desktop\PO#4018-308875.pdf.exe\:Zone.Identifier read attributes | delete
        Source: C:\Users\user\AppData\Roaming\tgfcdsxazs.exeFile opened: C:\Users\user\AppData\Roaming\tgfcdsxazs.exe\:Zone.Identifier read attributes | delete
        Uses an obfuscated file name to hide its real file extension (double extension)Show sources
        Source: Possible double extension: pdf.exeStatic PE information: PO#4018-308875.pdf.exe
        Source: C:\Users\user\Desktop\PO#4018-308875.pdf.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
        Source: C:\Users\user\Desktop\PO#4018-308875.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#4018-308875.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#4018-308875.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#4018-308875.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#4018-308875.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#4018-308875.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#4018-308875.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#4018-308875.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#4018-308875.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#4018-308875.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#4018-308875.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#4018-308875.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#4018-308875.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#4018-308875.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#4018-308875.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#4018-308875.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#4018-308875.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#4018-308875.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#4018-308875.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#4018-308875.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#4018-308875.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#4018-308875.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#4018-308875.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#4018-308875.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#4018-308875.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#4018-308875.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#4018-308875.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#4018-308875.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#4018-308875.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#4018-308875.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#4018-308875.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#4018-308875.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#4018-308875.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\tgfcdsxazs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\tgfcdsxazs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\tgfcdsxazs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\tgfcdsxazs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\tgfcdsxazs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\tgfcdsxazs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\tgfcdsxazs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\tgfcdsxazs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\tgfcdsxazs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\tgfcdsxazs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\tgfcdsxazs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\tgfcdsxazs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\tgfcdsxazs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\tgfcdsxazs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\tgfcdsxazs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\tgfcdsxazs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\tgfcdsxazs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\tgfcdsxazs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\tgfcdsxazs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\tgfcdsxazs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\tgfcdsxazs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\tgfcdsxazs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\tgfcdsxazs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\tgfcdsxazs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\tgfcdsxazs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\tgfcdsxazs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\tgfcdsxazs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\tgfcdsxazs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\tgfcdsxazs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\tgfcdsxazs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\tgfcdsxazs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\tgfcdsxazs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\tgfcdsxazs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\tgfcdsxazs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX

        Malware Analysis System Evasion:

        barindex
        Yara detected AntiVM_3Show sources
        Source: Yara matchFile source: Process Memory Space: PO#4018-308875.pdf.exe PID: 6520, type: MEMORY
        Source: C:\Users\user\Desktop\PO#4018-308875.pdf.exeFile opened / queried: SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
        Source: C:\Users\user\Desktop\PO#4018-308875.pdf.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\AppData\Roaming\tgfcdsxazs.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Desktop\PO#4018-308875.pdf.exeWindow / User API: threadDelayed 3568
        Source: C:\Users\user\Desktop\PO#4018-308875.pdf.exeWindow / User API: threadDelayed 6276
        Source: C:\Users\user\AppData\Roaming\tgfcdsxazs.exeWindow / User API: threadDelayed 428
        Source: C:\Users\user\AppData\Roaming\tgfcdsxazs.exeWindow / User API: threadDelayed 9426
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeWindow / User API: threadDelayed 1328
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeWindow / User API: threadDelayed 8353
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeWindow / User API: foregroundWindowGot 841
        Source: C:\Users\user\Desktop\PO#4018-308875.pdf.exe TID: 6680Thread sleep time: -18446744073709540s >= -30000s
        Source: C:\Users\user\Desktop\PO#4018-308875.pdf.exe TID: 6680Thread sleep time: -30000s >= -30000s
        Source: C:\Users\user\Desktop\PO#4018-308875.pdf.exe TID: 6684Thread sleep count: 3568 > 30
        Source: C:\Users\user\Desktop\PO#4018-308875.pdf.exe TID: 6684Thread sleep count: 6276 > 30
        Source: C:\Users\user\AppData\Roaming\tgfcdsxazs.exe TID: 6712Thread sleep time: -12912720851596678s >= -30000s
        Source: C:\Users\user\AppData\Roaming\tgfcdsxazs.exe TID: 6712Thread sleep time: -30000s >= -30000s
        Source: C:\Users\user\AppData\Roaming\tgfcdsxazs.exe TID: 6728Thread sleep count: 428 > 30
        Source: C:\Users\user\AppData\Roaming\tgfcdsxazs.exe TID: 6728Thread sleep count: 9426 > 30
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exe TID: 2076Thread sleep time: -6456360425798339s >= -30000s
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: tgfcdsxazs.exe, 00000014.00000002.696619283.00000000041D1000.00000004.00000001.sdmpBinary or memory string: VMware
        Source: tgfcdsxazs.exe, 00000014.00000002.696619283.00000000041D1000.00000004.00000001.sdmpBinary or memory string: vmware svga
        Source: PO#4018-308875.pdf.exe, 00000000.00000002.360758846.00000000059F0000.00000002.00000001.sdmp, reg.exe, 00000003.00000002.248938506.0000000002C20000.00000002.00000001.sdmp, InstallUtil.exe, 00000018.00000002.697689314.0000000006210000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
        Source: tgfcdsxazs.exe, 00000014.00000002.696619283.00000000041D1000.00000004.00000001.sdmpBinary or memory string: vmware
        Source: PO#4018-308875.pdf.exe, 00000000.00000002.356654386.0000000004301000.00000004.00000001.sdmp, tgfcdsxazs.exe, 00000014.00000002.696619283.00000000041D1000.00000004.00000001.sdmpBinary or memory string: tpautoconnsvc#Microsoft Hyper-V
        Source: PO#4018-308875.pdf.exe, 00000000.00000002.356654386.0000000004301000.00000004.00000001.sdmp, tgfcdsxazs.exe, 00000014.00000002.696619283.00000000041D1000.00000004.00000001.sdmpBinary or memory string: cmd.txtQEMUqemu
        Source: PO#4018-308875.pdf.exe, 00000000.00000002.356654386.0000000004301000.00000004.00000001.sdmp, tgfcdsxazs.exe, 00000014.00000002.696619283.00000000041D1000.00000004.00000001.sdmpBinary or memory string: vmusrvc
        Source: tgfcdsxazs.exe, 00000014.00000002.696619283.00000000041D1000.00000004.00000001.sdmpBinary or memory string: vmsrvc
        Source: tgfcdsxazs.exe, 00000014.00000002.696619283.00000000041D1000.00000004.00000001.sdmpBinary or memory string: vmtools
        Source: tgfcdsxazs.exe, 00000014.00000002.696619283.00000000041D1000.00000004.00000001.sdmpBinary or memory string: vmware sata5vmware usb pointing device-vmware vmci bus deviceCvmware virtual s scsi disk device
        Source: tgfcdsxazs.exe, 00000014.00000002.696619283.00000000041D1000.00000004.00000001.sdmpBinary or memory string: vboxservicevbox)Microsoft Virtual PC
        Source: PO#4018-308875.pdf.exe, 00000000.00000002.360758846.00000000059F0000.00000002.00000001.sdmp, reg.exe, 00000003.00000002.248938506.0000000002C20000.00000002.00000001.sdmp, InstallUtil.exe, 00000018.00000002.697689314.0000000006210000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
        Source: PO#4018-308875.pdf.exe, 00000000.00000002.355408732.00000000014FF000.00000004.00000020.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}tl|_tl\
        Source: PO#4018-308875.pdf.exe, 00000000.00000002.360758846.00000000059F0000.00000002.00000001.sdmp, reg.exe, 00000003.00000002.248938506.0000000002C20000.00000002.00000001.sdmp, InstallUtil.exe, 00000018.00000002.697689314.0000000006210000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
        Source: tgfcdsxazs.exe, 00000014.00000002.696619283.00000000041D1000.00000004.00000001.sdmpBinary or memory string: virtual-vmware pointing device
        Source: PO#4018-308875.pdf.exe, 00000000.00000002.360758846.00000000059F0000.00000002.00000001.sdmp, reg.exe, 00000003.00000002.248938506.0000000002C20000.00000002.00000001.sdmp, InstallUtil.exe, 00000018.00000002.697689314.0000000006210000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
        Source: C:\Users\user\Desktop\PO#4018-308875.pdf.exeProcess information queried: ProcessInformation
        Source: C:\Users\user\Desktop\PO#4018-308875.pdf.exeProcess token adjusted: Debug
        Source: C:\Users\user\AppData\Roaming\tgfcdsxazs.exeProcess token adjusted: Debug
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess token adjusted: Debug
        Source: C:\Users\user\Desktop\PO#4018-308875.pdf.exeMemory allocated: page read and write | page guard

        HIPS / PFW / Operating System Protection Evasion:

        barindex
        Allocates memory in foreign processesShow sources
        Source: C:\Users\user\AppData\Roaming\tgfcdsxazs.exeMemory allocated: C:\Users\user\AppData\Local\Temp\InstallUtil.exe base: 390000 protect: page execute and read and write
        Injects a PE file into a foreign processesShow sources
        Source: C:\Users\user\AppData\Roaming\tgfcdsxazs.exeMemory written: C:\Users\user\AppData\Local\Temp\InstallUtil.exe base: 390000 value starts with: 4D5A
        Writes to foreign memory regionsShow sources
        Source: C:\Users\user\AppData\Roaming\tgfcdsxazs.exeMemory written: C:\Users\user\AppData\Local\Temp\InstallUtil.exe base: 390000
        Source: C:\Users\user\AppData\Roaming\tgfcdsxazs.exeMemory written: C:\Users\user\AppData\Local\Temp\InstallUtil.exe base: 392000
        Source: C:\Users\user\AppData\Roaming\tgfcdsxazs.exeMemory written: C:\Users\user\AppData\Local\Temp\InstallUtil.exe base: 3B0000
        Source: C:\Users\user\AppData\Roaming\tgfcdsxazs.exeMemory written: C:\Users\user\AppData\Local\Temp\InstallUtil.exe base: 3B2000
        Source: C:\Users\user\AppData\Roaming\tgfcdsxazs.exeMemory written: C:\Users\user\AppData\Local\Temp\InstallUtil.exe base: 570008
        Source: C:\Users\user\Desktop\PO#4018-308875.pdf.exeProcess created: C:\Windows\SysWOW64\cmd.exe 'cmd.exe' /c REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'kolkmjnhgf' /t REG_SZ /d 'C:\Users\user\AppData\Roaming\tgfcdsxazs.exe'
        Source: C:\Users\user\Desktop\PO#4018-308875.pdf.exeProcess created: C:\Users\user\AppData\Roaming\tgfcdsxazs.exe 'C:\Users\user\AppData\Roaming\tgfcdsxazs.exe'
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'kolkmjnhgf' /t REG_SZ /d 'C:\Users\user\AppData\Roaming\tgfcdsxazs.exe'
        Source: C:\Users\user\AppData\Roaming\tgfcdsxazs.exeProcess created: C:\Users\user\AppData\Local\Temp\InstallUtil.exe C:\Users\user\AppData\Local\Temp\InstallUtil.exe
        Source: InstallUtil.exe, 00000018.00000002.697835412.000000000643D000.00000004.00000001.sdmpBinary or memory string: Program Manager
        Source: tgfcdsxazs.exe, 00000014.00000002.689001890.0000000001B20000.00000002.00000001.sdmp, InstallUtil.exe, 00000018.00000002.688967037.0000000001120000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
        Source: tgfcdsxazs.exe, 00000014.00000002.689001890.0000000001B20000.00000002.00000001.sdmp, InstallUtil.exe, 00000018.00000002.688967037.0000000001120000.00000002.00000001.sdmpBinary or memory string: Progman
        Source: tgfcdsxazs.exe, 00000014.00000002.689001890.0000000001B20000.00000002.00000001.sdmp, InstallUtil.exe, 00000018.00000002.688967037.0000000001120000.00000002.00000001.sdmpBinary or memory string: SProgram Managerl
        Source: InstallUtil.exe, 00000018.00000002.689747161.0000000002764000.00000004.00000001.sdmpBinary or memory string: Program Managerx
        Source: tgfcdsxazs.exe, 00000014.00000002.689001890.0000000001B20000.00000002.00000001.sdmp, InstallUtil.exe, 00000018.00000002.688967037.0000000001120000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd,
        Source: tgfcdsxazs.exe, 00000014.00000002.689001890.0000000001B20000.00000002.00000001.sdmp, InstallUtil.exe, 00000018.00000002.688967037.0000000001120000.00000002.00000001.sdmpBinary or memory string: Progmanlock
        Source: InstallUtil.exe, 00000018.00000002.689747161.0000000002764000.00000004.00000001.sdmpBinary or memory string: Program Manager`
        Source: C:\Users\user\Desktop\PO#4018-308875.pdf.exeQueries volume information: C:\Users\user\Desktop\PO#4018-308875.pdf.exe VolumeInformation
        Source: C:\Users\user\Desktop\PO#4018-308875.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Users\user\Desktop\PO#4018-308875.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
        Source: C:\Users\user\AppData\Roaming\tgfcdsxazs.exeQueries volume information: C:\Users\user\AppData\Roaming\tgfcdsxazs.exe VolumeInformation
        Source: C:\Users\user\AppData\Roaming\tgfcdsxazs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Users\user\AppData\Roaming\tgfcdsxazs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeQueries volume information: C:\Users\user\AppData\Local\Temp\InstallUtil.exe VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
        Source: C:\Users\user\Desktop\PO#4018-308875.pdf.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

        Stealing of Sensitive Information:

        barindex
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 00000000.00000002.356654386.0000000004301000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000018.00000002.687092112.0000000000392000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000018.00000002.697259526.0000000005150000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000018.00000002.694427019.0000000003759000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000014.00000002.696946485.0000000004B14000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000014.00000002.696822953.0000000004A81000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: PO#4018-308875.pdf.exe PID: 6520, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 3888, type: MEMORY
        Source: Yara matchFile source: 24.2.InstallUtil.exe.5150000.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 24.2.InstallUtil.exe.390000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 24.2.InstallUtil.exe.5150000.5.unpack, type: UNPACKEDPE

        Remote Access Functionality:

        barindex
        Detected Nanocore RatShow sources
        Source: PO#4018-308875.pdf.exe, 00000000.00000002.356654386.0000000004301000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: InstallUtil.exe, 00000018.00000002.689747161.0000000002764000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: InstallUtil.exe, 00000018.00000002.689747161.0000000002764000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 00000000.00000002.356654386.0000000004301000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000018.00000002.687092112.0000000000392000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000018.00000002.697259526.0000000005150000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000018.00000002.694427019.0000000003759000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000014.00000002.696946485.0000000004B14000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000014.00000002.696822953.0000000004A81000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: PO#4018-308875.pdf.exe PID: 6520, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 3888, type: MEMORY
        Source: Yara matchFile source: 24.2.InstallUtil.exe.5150000.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 24.2.InstallUtil.exe.390000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 24.2.InstallUtil.exe.5150000.5.unpack, type: UNPACKEDPE

        Mitre Att&ck Matrix

        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
        Valid Accounts1Windows Management InstrumentationValid Accounts1Valid Accounts1Disable or Modify Tools1Input Capture11File and Directory Discovery1Remote ServicesArchive Collected Data11Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
        Default AccountsScheduled Task/JobRegistry Run Keys / Startup Folder1Access Token Manipulation1Deobfuscate/Decode Files or Information1LSASS MemorySystem Information Discovery12Remote Desktop ProtocolInput Capture11Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
        Domain AccountsAt (Linux)Logon Script (Windows)Process Injection312Obfuscated Files or Information12Security Account ManagerQuery Registry1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationRemote Access Software1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
        Local AccountsAt (Windows)Logon Script (Mac)Registry Run Keys / Startup Folder1Software Packing11NTDSSecurity Software Discovery111Distributed Component Object ModelInput CaptureScheduled TransferNon-Application Layer Protocol1SIM Card SwapCarrier Billing Fraud
        Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptMasquerading11LSA SecretsVirtualization/Sandbox Evasion3SSHKeyloggingData Transfer Size LimitsApplication Layer Protocol21Manipulate Device CommunicationManipulate App Store Rankings or Ratings
        Replication Through Removable MediaLaunchdRc.commonRc.commonValid Accounts1Cached Domain CredentialsProcess Discovery2VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
        External Remote ServicesScheduled TaskStartup ItemsStartup ItemsModify Registry1DCSyncApplication Window Discovery1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
        Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobAccess Token Manipulation1Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
        Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Virtualization/Sandbox Evasion3/etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
        Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)Process Injection312Network SniffingProcess DiscoveryTaint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact
        Compromise Software Dependencies and Development ToolsWindows Command ShellCronCronHidden Files and Directories1Input CapturePermission Groups DiscoveryReplication Through Removable MediaRemote Data StagingExfiltration Over Physical MediumMail ProtocolsService Stop

        Behavior Graph

        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet
        behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 343937 Sample: PO#4018-308875.pdf.exe Startdate: 25/01/2021 Architecture: WINDOWS Score: 100 39 185.162.88.26:2091 unknown unknown 2->39 41 fenixalec.ddns.net 2->41 43 Found malware configuration 2->43 45 Malicious sample detected (through community Yara rule) 2->45 47 Multi AV Scanner detection for submitted file 2->47 49 9 other signatures 2->49 8 PO#4018-308875.pdf.exe 5 2->8         started        signatures3 process4 file5 27 C:\Users\user\AppData\...\tgfcdsxazs.exe, PE32 8->27 dropped 29 C:\Users\user\AppData\...\InstallUtil.exe, PE32 8->29 dropped 31 C:\Users\...\tgfcdsxazs.exe:Zone.Identifier, ASCII 8->31 dropped 33 C:\Users\user\...\PO#4018-308875.pdf.exe.log, ASCII 8->33 dropped 51 Hides that the sample has been downloaded from the Internet (zone.identifier) 8->51 12 tgfcdsxazs.exe 2 8->12         started        15 cmd.exe 1 8->15         started        signatures6 process7 signatures8 53 Multi AV Scanner detection for dropped file 12->53 55 Writes to foreign memory regions 12->55 57 Allocates memory in foreign processes 12->57 59 2 other signatures 12->59 17 InstallUtil.exe 6 12->17         started        21 conhost.exe 15->21         started        23 reg.exe 1 1 15->23         started        process9 dnsIp10 35 fenixalec.ddns.net 185.162.88.26, 20911, 49737, 49738 AS40676US Netherlands 17->35 37 192.168.2.1 unknown unknown 17->37 25 C:\Users\user\AppData\Roaming\...\run.dat, ISO-8859 17->25 dropped file11

        Screenshots

        Thumbnails

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.

        windows-stand

        Antivirus, Machine Learning and Genetic Malware Detection

        Initial Sample

        SourceDetectionScannerLabelLink
        PO#4018-308875.pdf.exe30%MetadefenderBrowse
        PO#4018-308875.pdf.exe67%ReversingLabsByteCode-MSIL.Backdoor.NanoCore

        Dropped Files

        SourceDetectionScannerLabelLink
        C:\Users\user\AppData\Local\Temp\InstallUtil.exe0%MetadefenderBrowse
        C:\Users\user\AppData\Local\Temp\InstallUtil.exe0%ReversingLabs
        C:\Users\user\AppData\Roaming\tgfcdsxazs.exe30%MetadefenderBrowse
        C:\Users\user\AppData\Roaming\tgfcdsxazs.exe67%ReversingLabsByteCode-MSIL.Backdoor.NanoCore

        Unpacked PE Files

        SourceDetectionScannerLabelLinkDownload
        24.2.InstallUtil.exe.5150000.5.unpack100%AviraTR/NanoCore.fadteDownload File
        24.2.InstallUtil.exe.390000.1.unpack100%AviraTR/Dropper.MSIL.Gen7Download File

        Domains

        No Antivirus matches

        URLs

        SourceDetectionScannerLabelLink
        http://ns.ado/Ident0%Avira URL Cloudsafe
        http://iptc.tc4xmp0%Avira URL Cloudsafe

        Domains and IPs

        Contacted Domains

        NameIPActiveMaliciousAntivirus DetectionReputation
        fenixalec.ddns.net
        185.162.88.26
        truetrue
          unknown

          URLs from Memory and Binaries

          NameSourceMaliciousAntivirus DetectionReputation
          http://ns.ado/Identtgfcdsxazs.exe, 00000014.00000002.688965801.0000000001789000.00000004.00000040.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://iptc.tc4xmptgfcdsxazs.exe, 00000014.00000002.688965801.0000000001789000.00000004.00000040.sdmpfalse
          • Avira URL Cloud: safe
          unknown

          Contacted IPs

          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs

          Public

          IPDomainCountryFlagASNASN NameMalicious
          185.162.88.26:2091
          unknownunknown
          unknownunknowntrue
          185.162.88.26
          unknownNetherlands
          40676AS40676UStrue

          Private

          IP
          192.168.2.1

          General Information

          Joe Sandbox Version:31.0.0 Emerald
          Analysis ID:343937
          Start date:25.01.2021
          Start time:19:20:18
          Joe Sandbox Product:CloudBasic
          Overall analysis duration:0h 11m 10s
          Hypervisor based Inspection enabled:false
          Report type:light
          Sample file name:PO#4018-308875.pdf.exe
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
          Number of analysed new started processes analysed:34
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • HDC enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Detection:MAL
          Classification:mal100.troj.evad.winEXE@10/5@12/3
          EGA Information:Failed
          HDC Information:
          • Successful, ratio: 0.9% (good quality ratio 0.5%)
          • Quality average: 39.4%
          • Quality standard deviation: 37.5%
          HCA Information:
          • Successful, ratio: 100%
          • Number of executed functions: 0
          • Number of non-executed functions: 0
          Cookbook Comments:
          • Adjust boot time
          • Enable AMSI
          • Found application associated with file extension: .exe
          Warnings:
          Show All
          • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
          • TCP Packets have been reduced to 100
          • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, HxTsr.exe, RuntimeBroker.exe, WMIADAP.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, wuapihost.exe
          • Excluded IPs from analysis (whitelisted): 13.88.21.125, 95.101.184.67, 51.104.144.132, 92.122.213.194, 92.122.213.247, 2.20.142.209, 2.20.142.210, 51.103.5.159, 20.54.26.129, 52.155.217.156
          • Excluded domains from analysis (whitelisted): au.download.windowsupdate.com.edgesuite.net, arc.msn.com.nsatc.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, wns.notify.windows.com.akadns.net, arc.msn.com, vip1-par02p.wns.notify.trafficmanager.net, db5eap.displaycatalog.md.mp.microsoft.com.akadns.net, emea1.notify.windows.com.akadns.net, audownload.windowsupdate.nsatc.net, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, au-bg-shim.trafficmanager.net, displaycatalog-europeeap.md.mp.microsoft.com.akadns.net, client.wns.windows.com, fs.microsoft.com, db3p-ris-pf-prod-atm.trafficmanager.net, ris-prod.trafficmanager.net, displaycatalog.md.mp.microsoft.com.akadns.net, e1723.g.akamaiedge.net, ctldl.windowsupdate.com, a767.dscg3.akamai.net, ris.api.iris.microsoft.com, blobcollector.events.data.trafficmanager.net, par02p.wns.notify.trafficmanager.net, skypedataprdcolwus15.cloudapp.net
          • Report size exceeded maximum capacity and may have missing behavior information.
          • Report size getting too big, too many NtAllocateVirtualMemory calls found.
          • Report size getting too big, too many NtOpenKeyEx calls found.
          • Report size getting too big, too many NtQueryValueKey calls found.
          • Report size getting too big, too many NtReadVirtualMemory calls found.
          • VT rate limit hit for: /opt/package/joesandbox/database/analysis/343937/sample/PO#4018-308875.pdf.exe

          Simulations

          Behavior and APIs

          TimeTypeDescription
          19:21:18API Interceptor208x Sleep call for process: PO#4018-308875.pdf.exe modified
          19:21:22AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run kolkmjnhgf C:\Users\user\AppData\Roaming\tgfcdsxazs.exe
          19:21:31AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run kolkmjnhgf C:\Users\user\AppData\Roaming\tgfcdsxazs.exe
          19:22:13API Interceptor214x Sleep call for process: tgfcdsxazs.exe modified

          Joe Sandbox View / Context

          IPs

          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
          185.162.88.26PO#4018-308875.exeGet hashmaliciousBrowse
            PO#4018-308875.exeGet hashmaliciousBrowse
              PO#4018-308875.pdf.exeGet hashmaliciousBrowse
                MEDUSI492126.pdf.exeGet hashmaliciousBrowse
                  silkOrder00110.pdf.exeGet hashmaliciousBrowse
                    Order_BC012356.pdf.exeGet hashmaliciousBrowse
                      Document#20014464370.pdf.exeGet hashmaliciousBrowse

                        Domains

                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                        fenixalec.ddns.netPO#4018-308875.exeGet hashmaliciousBrowse
                        • 185.162.88.26
                        PO#4018-308875.exeGet hashmaliciousBrowse
                        • 185.162.88.26
                        PO#4018-308875.pdf.exeGet hashmaliciousBrowse
                        • 185.162.88.26
                        MEDUSI492126.pdf.exeGet hashmaliciousBrowse
                        • 185.162.88.26
                        silkOrder00110.pdf.exeGet hashmaliciousBrowse
                        • 185.162.88.26
                        Order_BC012356.pdf.exeGet hashmaliciousBrowse
                        • 185.162.88.26
                        Document#20014464370.pdf.exeGet hashmaliciousBrowse
                        • 185.162.88.26

                        ASN

                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                        AS40676USPO#4018-308875.exeGet hashmaliciousBrowse
                        • 185.162.88.26
                        PO#4018-308875.exeGet hashmaliciousBrowse
                        • 185.162.88.26
                        PO#4018-308875.pdf.exeGet hashmaliciousBrowse
                        • 185.162.88.26
                        Ulma9B5jo1.exeGet hashmaliciousBrowse
                        • 104.149.57.92
                        MEDUSI492126.pdf.exeGet hashmaliciousBrowse
                        • 185.162.88.26
                        Request for Quotation.exeGet hashmaliciousBrowse
                        • 45.34.249.53
                        silkOrder00110.pdf.exeGet hashmaliciousBrowse
                        • 185.162.88.26
                        Order_BC012356.pdf.exeGet hashmaliciousBrowse
                        • 185.162.88.26
                        Document#20014464370.pdf.exeGet hashmaliciousBrowse
                        • 185.162.88.26
                        t1XJOlYvhExZyrm.exeGet hashmaliciousBrowse
                        • 104.225.208.15
                        SWIFT_COPY00993Payment_advic4555pdf.exeGet hashmaliciousBrowse
                        • 172.106.111.244
                        QN08qH1zYv.exeGet hashmaliciousBrowse
                        • 104.149.57.92
                        SWIFT-COPY Payment advice3243343.exeGet hashmaliciousBrowse
                        • 172.106.111.244
                        catalogo TAWI group.exeGet hashmaliciousBrowse
                        • 107.160.127.252
                        Rfq 214871_TAWI Catalog.exeGet hashmaliciousBrowse
                        • 107.160.127.252
                        Rfq_Catalog.exeGet hashmaliciousBrowse
                        • 107.160.127.252
                        NPD76122.exeGet hashmaliciousBrowse
                        • 104.217.231.247
                        h3dFAROdF3.exeGet hashmaliciousBrowse
                        • 104.217.231.248
                        d2mISAbTQN.exeGet hashmaliciousBrowse
                        • 104.217.231.248
                        n41pVXkYCe.exeGet hashmaliciousBrowse
                        • 104.217.231.248

                        JA3 Fingerprints

                        No context

                        Dropped Files

                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                        C:\Users\user\AppData\Local\Temp\InstallUtil.exefile.exeGet hashmaliciousBrowse
                          IMG_5371.EXEGet hashmaliciousBrowse
                            file.exeGet hashmaliciousBrowse
                              IMG_9501.EXEGet hashmaliciousBrowse
                                IMG_04017.pdf.exeGet hashmaliciousBrowse
                                  GFS_03781.xls.exeGet hashmaliciousBrowse
                                    SPpfYOx5Ju.exeGet hashmaliciousBrowse
                                      PO#4018-308875.exeGet hashmaliciousBrowse
                                        PO#4018-308875.exeGet hashmaliciousBrowse
                                          IMG_57880.pdf.exeGet hashmaliciousBrowse
                                            PO 67542 PDF.exeGet hashmaliciousBrowse
                                              Mi9eI6wu1p.exeGet hashmaliciousBrowse
                                                OJ4zX7G77Y.exeGet hashmaliciousBrowse
                                                  IMG_50781.pdf.exeGet hashmaliciousBrowse
                                                    IMG_25579.pdf.exeGet hashmaliciousBrowse
                                                      IMG_40317.pdf.exeGet hashmaliciousBrowse
                                                        PO#4018-308875.pdf.exeGet hashmaliciousBrowse
                                                          SecuriteInfo.com.Trojan.PackedNET.509.8504.exeGet hashmaliciousBrowse
                                                            IMG_80137.pdf.exeGet hashmaliciousBrowse
                                                              Ziraat Bankasi Swift Mesaji.exeGet hashmaliciousBrowse

                                                                Created / dropped Files

                                                                C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\PO#4018-308875.pdf.exe.log
                                                                Process:C:\Users\user\Desktop\PO#4018-308875.pdf.exe
                                                                File Type:ASCII text, with CRLF line terminators
                                                                Category:modified
                                                                Size (bytes):1053
                                                                Entropy (8bit):5.325704407203577
                                                                Encrypted:false
                                                                SSDEEP:24:ML9E4Ks2f84qjE4O1lEE4UVwPKDE4KhK3VZ9pKhp1qE4j:MxHKXfvYHKlEHU0YHKhQnop1qHj
                                                                MD5:3B9C7DC17C94CE377F491CCDC1BDCED7
                                                                SHA1:D20A7E0334D6F6DA612F30E3B07CFF952913D26F
                                                                SHA-256:8578FE540949379FFF261A305EDAB9562D5C6E8148FD07F2A215133E8837C855
                                                                SHA-512:77EFDDAA09B6ED829CE681D49C4767CA985C551A0BE64C5E2041CECBADCAE9645C8E9AB070B512ACB9A01FAA5E6B0F3A3BEEB348C99C4C80F012C1E90A688A8C
                                                                Malicious:true
                                                                Reputation:low
                                                                Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"PresentationCore, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35","C:\Windows\assembly\NativeImages_v4.0.30319_32\PresentationCore\820a27781e8540ca263d835ec155f1a5\PresentationCore.ni.dll",0..3,"PresentationFramework, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35","C:\Windows\assembly\NativeImages_v4.0.30319_32\Presentatio5ae0f00f#\889128adc9a7c9370e5e293f65060164\PresentationFramework.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..2,"System.Drawing, Version=4.0.0.0,
                                                                C:\Users\user\AppData\Local\Temp\InstallUtil.exe
                                                                Process:C:\Users\user\Desktop\PO#4018-308875.pdf.exe
                                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):41064
                                                                Entropy (8bit):6.164873449128079
                                                                Encrypted:false
                                                                SSDEEP:384:FtpFVLK0MsihB9VKS7xdgE7KJ9Yl6dnPU3SERztmbqCJstdMardz/JikPZ+sPZTd:ZBMs2SqdD86Iq8gZZFyViML3an
                                                                MD5:EFEC8C379D165E3F33B536739AEE26A3
                                                                SHA1:C875908ACBA5CAC1E0B40F06A83F0F156A2640FA
                                                                SHA-256:46DEE184523A584E56DF93389F81992911A1BA6B1F05AD7D803C6AB1450E18CB
                                                                SHA-512:497847EC115D9AF78899E6DC20EC32A60B16954F83CF5169A23DD3F1459CB632DAC95417BD898FD1895C9FE2262FCBF7838FCF6919FB3B851A0557FBE07CCFFA
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: Metadefender, Detection: 0%, Browse
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Joe Sandbox View:
                                                                • Filename: file.exe, Detection: malicious, Browse
                                                                • Filename: IMG_5371.EXE, Detection: malicious, Browse
                                                                • Filename: file.exe, Detection: malicious, Browse
                                                                • Filename: IMG_9501.EXE, Detection: malicious, Browse
                                                                • Filename: IMG_04017.pdf.exe, Detection: malicious, Browse
                                                                • Filename: GFS_03781.xls.exe, Detection: malicious, Browse
                                                                • Filename: SPpfYOx5Ju.exe, Detection: malicious, Browse
                                                                • Filename: PO#4018-308875.exe, Detection: malicious, Browse
                                                                • Filename: PO#4018-308875.exe, Detection: malicious, Browse
                                                                • Filename: IMG_57880.pdf.exe, Detection: malicious, Browse
                                                                • Filename: PO 67542 PDF.exe, Detection: malicious, Browse
                                                                • Filename: Mi9eI6wu1p.exe, Detection: malicious, Browse
                                                                • Filename: OJ4zX7G77Y.exe, Detection: malicious, Browse
                                                                • Filename: IMG_50781.pdf.exe, Detection: malicious, Browse
                                                                • Filename: IMG_25579.pdf.exe, Detection: malicious, Browse
                                                                • Filename: IMG_40317.pdf.exe, Detection: malicious, Browse
                                                                • Filename: PO#4018-308875.pdf.exe, Detection: malicious, Browse
                                                                • Filename: SecuriteInfo.com.Trojan.PackedNET.509.8504.exe, Detection: malicious, Browse
                                                                • Filename: IMG_80137.pdf.exe, Detection: malicious, Browse
                                                                • Filename: Ziraat Bankasi Swift Mesaji.exe, Detection: malicious, Browse
                                                                Reputation:moderate, very likely benign file
                                                                Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....Z.Z..............0..T...........r... ........@.. ....................................`.................................4r..O....................b..h>...........p............................................... ............... ..H............text....R... ...T.................. ..`.rsrc................V..............@..@.reloc...............`..............@..B................hr......H........"..|J..........lm.......o......................................2~.....o....*.r...p(....*VrK..p(....s.........*..0..........(....(....o....o....(....o.... .....T(....o....(....o....o ...o!....4(....o....(....o....o ...o".....(....rm..ps#...o....($........(%....o&....ry..p......%.r...p.%.(.....(....('....((.......o)...('........*.*................"..(*...*..{Q...-...}Q.....(+...(....(,....(+...*"..(-...*..(....*..(.....r...p.(/...o0...s....}T...*....0.. .......~S...-.s
                                                                C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
                                                                Process:C:\Users\user\AppData\Local\Temp\InstallUtil.exe
                                                                File Type:ISO-8859 text, with no line terminators
                                                                Category:dropped
                                                                Size (bytes):8
                                                                Entropy (8bit):3.0
                                                                Encrypted:false
                                                                SSDEEP:3:XNMUn:dt
                                                                MD5:6EBD13D8E407D7E32EA1E3D18A89D4AE
                                                                SHA1:A19612E4D9AB161A31A41926D0F762A9D39B7722
                                                                SHA-256:50EAE76B92449775A23838CAE70A10537AA728AB6543B4822F0E4DA6F78F2EF3
                                                                SHA-512:526007EF589B87F1112807E93BE678A76C63510FEA40CDB28104422C631C02725831FF275A44BC8066D8D2E48C99A1E1F0A151B1405DF9E0E2D6F0BF981FC07A
                                                                Malicious:true
                                                                Reputation:low
                                                                Preview: .'C....H
                                                                C:\Users\user\AppData\Roaming\tgfcdsxazs.exe
                                                                Process:C:\Users\user\Desktop\PO#4018-308875.pdf.exe
                                                                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):642048
                                                                Entropy (8bit):5.385036110771852
                                                                Encrypted:false
                                                                SSDEEP:6144:zE65Gn+cJUsvcfFH+mff7BBTkNAo23KB2pTwcSn9vCfEvgYt:UnVWsvcdHpTkJ23d9ZSn9V9t
                                                                MD5:EA28F2D01808072DBE45804F514EF905
                                                                SHA1:771FF981D42D6C7FC3550DE8CB109E3311B0E0FA
                                                                SHA-256:618D343A6D7F54A0BFD917555C79C6A777B10A35FC2DA0D75F6D85354DE40637
                                                                SHA-512:14C8F4C649F60238A1398BF28CD8A1A1C94D14B74D888A26BCA537317DE1D1BEADA94A6FDB5D51A3AD30EE4C07E389E0FE6EB988E29DF485808FD19114715D16
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: Metadefender, Detection: 30%, Browse
                                                                • Antivirus: ReversingLabs, Detection: 67%
                                                                Reputation:low
                                                                Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...}.................................... ........@.. ....................... ............`.....................................K......."............................................................................ ............... ..H............text...$.... ...................... ..`.rsrc..."...........................@..@.reloc..............................@..B........................H............$......M.......6..........................................g...s...?.S.Q..S.5*.LG}x.....6....c.:R..V..H..w../S...!.~..G...|.vd.2.G....M....\.d.X..E........Q3*...\.].;...$Yi...2:._...Je...b.B.T:.... .p..KC..5Rj....K..<....5..g..fA...7Q...w.O..^..9...}......SN.%p...V..@).{..J.9..wO!...w.M....bT.....yb.c..S.G.H.bB..u8B]..2.>i|z..G...A`n=.x..=...+...-..l...w..3....=..6r..Q:t{..u.8...Q....De.m~w... #.I.....;.....S[..KFK,+...O).4....C:.g....cv.}?
                                                                C:\Users\user\AppData\Roaming\tgfcdsxazs.exe:Zone.Identifier
                                                                Process:C:\Users\user\Desktop\PO#4018-308875.pdf.exe
                                                                File Type:ASCII text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):26
                                                                Entropy (8bit):3.95006375643621
                                                                Encrypted:false
                                                                SSDEEP:3:ggPYV:rPYV
                                                                MD5:187F488E27DB4AF347237FE461A079AD
                                                                SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                                SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                                SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                                Malicious:true
                                                                Reputation:high, very likely benign file
                                                                Preview: [ZoneTransfer]....ZoneId=0

                                                                Static File Info

                                                                General

                                                                File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                Entropy (8bit):5.385036110771852
                                                                TrID:
                                                                • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                                • Win32 Executable (generic) a (10002005/4) 49.78%
                                                                • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                • Generic Win/DOS Executable (2004/3) 0.01%
                                                                • DOS Executable Generic (2002/1) 0.01%
                                                                File name:PO#4018-308875.pdf.exe
                                                                File size:642048
                                                                MD5:ea28f2d01808072dbe45804f514ef905
                                                                SHA1:771ff981d42d6c7fc3550de8cb109e3311b0e0fa
                                                                SHA256:618d343a6d7f54a0bfd917555c79c6a777b10a35fc2da0d75f6d85354de40637
                                                                SHA512:14c8f4c649f60238a1398bf28cd8a1a1c94d14b74d888a26bca537317de1d1beada94a6fdb5d51a3ad30ee4c07e389e0fe6eb988e29df485808fd19114715d16
                                                                SSDEEP:6144:zE65Gn+cJUsvcfFH+mff7BBTkNAo23KB2pTwcSn9vCfEvgYt:UnVWsvcdHpTkJ23d9ZSn9V9t
                                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...}.................................... ........@.. ....................... ............`................................

                                                                File Icon

                                                                Icon Hash:b2a88c96b2ca6a72

                                                                Static PE Info

                                                                General

                                                                Entrypoint:0x49dc1e
                                                                Entrypoint Section:.text
                                                                Digitally signed:false
                                                                Imagebase:0x400000
                                                                Subsystem:windows gui
                                                                Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                                                DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
                                                                Time Stamp:0x7EAB87D [Mon Mar 18 07:19:25 1974 UTC]
                                                                TLS Callbacks:
                                                                CLR (.Net) Version:v4.0.30319
                                                                OS Version Major:4
                                                                OS Version Minor:0
                                                                File Version Major:4
                                                                File Version Minor:0
                                                                Subsystem Version Major:4
                                                                Subsystem Version Minor:0
                                                                Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                                                Entrypoint Preview

                                                                Instruction
                                                                jmp dword ptr [00402000h]
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al

                                                                Data Directories

                                                                NameVirtual AddressVirtual Size Is in Section
                                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_IMPORT0x9dbd00x4b.text
                                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x9e0000x922.rsrc
                                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0xa00000xc.reloc
                                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                                Sections

                                                                NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                .text0x20000x9bc240x9be00False0.530125426022data5.39137035522IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                                .rsrc0x9e0000x9220xa00False0.39765625data4.07942545767IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                .reloc0xa00000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                                                Resources

                                                                NameRVASizeTypeLanguageCountry
                                                                RT_ICON0x9e1300x2e8data
                                                                RT_GROUP_ICON0x9e4180x14data
                                                                RT_VERSION0x9e42c0x30cdata
                                                                RT_MANIFEST0x9e7380x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                                                                Imports

                                                                DLLImport
                                                                mscoree.dll_CorExeMain

                                                                Version Infos

                                                                DescriptionData
                                                                LegalCopyrightMozilla Corporation
                                                                FileVersion30.0
                                                                CompanyNameMozilla Corporation
                                                                ProductNameMozilla Webapp Runtime App Uninstaller
                                                                ProductVersion30.0
                                                                FileDescriptionMozilla Webapp Runtime App Uninstaller
                                                                OriginalFilenamewebapp-uninstaller.exe
                                                                Translation0x0000 0x04b0

                                                                Network Behavior

                                                                Network Port Distribution

                                                                TCP Packets

                                                                TimestampSource PortDest PortSource IPDest IP
                                                                Jan 25, 2021 19:22:50.867099047 CET4973720911192.168.2.5185.162.88.26
                                                                Jan 25, 2021 19:22:50.917706966 CET2091149737185.162.88.26192.168.2.5
                                                                Jan 25, 2021 19:22:51.432061911 CET4973720911192.168.2.5185.162.88.26
                                                                Jan 25, 2021 19:22:51.482927084 CET2091149737185.162.88.26192.168.2.5
                                                                Jan 25, 2021 19:22:51.994605064 CET4973720911192.168.2.5185.162.88.26
                                                                Jan 25, 2021 19:22:52.045367956 CET2091149737185.162.88.26192.168.2.5
                                                                Jan 25, 2021 19:22:56.092926025 CET4973820911192.168.2.5185.162.88.26
                                                                Jan 25, 2021 19:22:56.143428087 CET2091149738185.162.88.26192.168.2.5
                                                                Jan 25, 2021 19:22:56.651403904 CET4973820911192.168.2.5185.162.88.26
                                                                Jan 25, 2021 19:22:56.701961994 CET2091149738185.162.88.26192.168.2.5
                                                                Jan 25, 2021 19:22:57.213876963 CET4973820911192.168.2.5185.162.88.26
                                                                Jan 25, 2021 19:22:57.264617920 CET2091149738185.162.88.26192.168.2.5
                                                                Jan 25, 2021 19:23:01.406389952 CET4973920911192.168.2.5185.162.88.26
                                                                Jan 25, 2021 19:23:01.457076073 CET2091149739185.162.88.26192.168.2.5
                                                                Jan 25, 2021 19:23:01.964205980 CET4973920911192.168.2.5185.162.88.26
                                                                Jan 25, 2021 19:23:02.014895916 CET2091149739185.162.88.26192.168.2.5
                                                                Jan 25, 2021 19:23:02.526880026 CET4973920911192.168.2.5185.162.88.26
                                                                Jan 25, 2021 19:23:02.577524900 CET2091149739185.162.88.26192.168.2.5
                                                                Jan 25, 2021 19:23:06.753860950 CET4974020911192.168.2.5185.162.88.26
                                                                Jan 25, 2021 19:23:06.804553032 CET2091149740185.162.88.26192.168.2.5
                                                                Jan 25, 2021 19:23:07.308541059 CET4974020911192.168.2.5185.162.88.26
                                                                Jan 25, 2021 19:23:07.359183073 CET2091149740185.162.88.26192.168.2.5
                                                                Jan 25, 2021 19:23:07.870935917 CET4974020911192.168.2.5185.162.88.26
                                                                Jan 25, 2021 19:23:07.921593904 CET2091149740185.162.88.26192.168.2.5
                                                                Jan 25, 2021 19:23:12.043665886 CET4974120911192.168.2.5185.162.88.26
                                                                Jan 25, 2021 19:23:12.094314098 CET2091149741185.162.88.26192.168.2.5
                                                                Jan 25, 2021 19:23:12.605899096 CET4974120911192.168.2.5185.162.88.26
                                                                Jan 25, 2021 19:23:12.656771898 CET2091149741185.162.88.26192.168.2.5
                                                                Jan 25, 2021 19:23:13.168265104 CET4974120911192.168.2.5185.162.88.26
                                                                Jan 25, 2021 19:23:13.219265938 CET2091149741185.162.88.26192.168.2.5
                                                                Jan 25, 2021 19:23:17.384211063 CET4974220911192.168.2.5185.162.88.26
                                                                Jan 25, 2021 19:23:17.435059071 CET2091149742185.162.88.26192.168.2.5
                                                                Jan 25, 2021 19:23:17.945131063 CET4974220911192.168.2.5185.162.88.26
                                                                Jan 25, 2021 19:23:17.995830059 CET2091149742185.162.88.26192.168.2.5
                                                                Jan 25, 2021 19:23:18.512541056 CET4974220911192.168.2.5185.162.88.26
                                                                Jan 25, 2021 19:23:18.563309908 CET2091149742185.162.88.26192.168.2.5
                                                                Jan 25, 2021 19:23:22.578202963 CET4974320911192.168.2.5185.162.88.26
                                                                Jan 25, 2021 19:23:22.628803015 CET2091149743185.162.88.26192.168.2.5
                                                                Jan 25, 2021 19:23:23.137830019 CET4974320911192.168.2.5185.162.88.26
                                                                Jan 25, 2021 19:23:23.188699007 CET2091149743185.162.88.26192.168.2.5
                                                                Jan 25, 2021 19:23:23.716943026 CET4974320911192.168.2.5185.162.88.26
                                                                Jan 25, 2021 19:23:23.767793894 CET2091149743185.162.88.26192.168.2.5
                                                                Jan 25, 2021 19:23:27.795892954 CET4974420911192.168.2.5185.162.88.26
                                                                Jan 25, 2021 19:23:27.846633911 CET2091149744185.162.88.26192.168.2.5
                                                                Jan 25, 2021 19:23:28.357002020 CET4974420911192.168.2.5185.162.88.26
                                                                Jan 25, 2021 19:23:28.407499075 CET2091149744185.162.88.26192.168.2.5
                                                                Jan 25, 2021 19:23:28.919524908 CET4974420911192.168.2.5185.162.88.26
                                                                Jan 25, 2021 19:23:28.970316887 CET2091149744185.162.88.26192.168.2.5
                                                                Jan 25, 2021 19:23:32.985024929 CET4974520911192.168.2.5185.162.88.26
                                                                Jan 25, 2021 19:23:33.035639048 CET2091149745185.162.88.26192.168.2.5
                                                                Jan 25, 2021 19:23:33.544953108 CET4974520911192.168.2.5185.162.88.26
                                                                Jan 25, 2021 19:23:33.595808983 CET2091149745185.162.88.26192.168.2.5
                                                                Jan 25, 2021 19:23:34.107724905 CET4974520911192.168.2.5185.162.88.26
                                                                Jan 25, 2021 19:23:34.158154964 CET2091149745185.162.88.26192.168.2.5
                                                                Jan 25, 2021 19:23:39.211354017 CET4974620911192.168.2.5185.162.88.26
                                                                Jan 25, 2021 19:23:39.262022972 CET2091149746185.162.88.26192.168.2.5
                                                                Jan 25, 2021 19:23:39.764205933 CET4974620911192.168.2.5185.162.88.26
                                                                Jan 25, 2021 19:23:39.815274954 CET2091149746185.162.88.26192.168.2.5
                                                                Jan 25, 2021 19:23:40.333091974 CET4974620911192.168.2.5185.162.88.26
                                                                Jan 25, 2021 19:23:40.383878946 CET2091149746185.162.88.26192.168.2.5
                                                                Jan 25, 2021 19:23:44.491286039 CET4974820911192.168.2.5185.162.88.26
                                                                Jan 25, 2021 19:23:44.542066097 CET2091149748185.162.88.26192.168.2.5
                                                                Jan 25, 2021 19:23:45.139461040 CET4974820911192.168.2.5185.162.88.26
                                                                Jan 25, 2021 19:23:45.190030098 CET2091149748185.162.88.26192.168.2.5
                                                                Jan 25, 2021 19:23:45.719048977 CET4974820911192.168.2.5185.162.88.26
                                                                Jan 25, 2021 19:23:45.769681931 CET2091149748185.162.88.26192.168.2.5
                                                                Jan 25, 2021 19:23:49.851212978 CET4975520911192.168.2.5185.162.88.26
                                                                Jan 25, 2021 19:23:49.901854992 CET2091149755185.162.88.26192.168.2.5
                                                                Jan 25, 2021 19:23:50.413796902 CET4975520911192.168.2.5185.162.88.26
                                                                Jan 25, 2021 19:23:50.464202881 CET2091149755185.162.88.26192.168.2.5
                                                                Jan 25, 2021 19:23:50.976363897 CET4975520911192.168.2.5185.162.88.26
                                                                Jan 25, 2021 19:23:51.027187109 CET2091149755185.162.88.26192.168.2.5
                                                                Jan 25, 2021 19:23:55.045542002 CET4975920911192.168.2.5185.162.88.26
                                                                Jan 25, 2021 19:23:55.096136093 CET2091149759185.162.88.26192.168.2.5
                                                                Jan 25, 2021 19:23:55.601819038 CET4975920911192.168.2.5185.162.88.26
                                                                Jan 25, 2021 19:23:55.652384043 CET2091149759185.162.88.26192.168.2.5
                                                                Jan 25, 2021 19:23:56.164279938 CET4975920911192.168.2.5185.162.88.26
                                                                Jan 25, 2021 19:23:56.214934111 CET2091149759185.162.88.26192.168.2.5
                                                                Jan 25, 2021 19:24:00.230130911 CET4976020911192.168.2.5185.162.88.26
                                                                Jan 25, 2021 19:24:00.280808926 CET2091149760185.162.88.26192.168.2.5
                                                                Jan 25, 2021 19:24:00.961648941 CET4976020911192.168.2.5185.162.88.26
                                                                Jan 25, 2021 19:24:01.012267113 CET2091149760185.162.88.26192.168.2.5
                                                                Jan 25, 2021 19:24:01.664941072 CET4976020911192.168.2.5185.162.88.26
                                                                Jan 25, 2021 19:24:01.715764046 CET2091149760185.162.88.26192.168.2.5
                                                                Jan 25, 2021 19:24:05.728708029 CET4976120911192.168.2.5185.162.88.26
                                                                Jan 25, 2021 19:24:05.779441118 CET2091149761185.162.88.26192.168.2.5
                                                                Jan 25, 2021 19:24:06.352679968 CET4976120911192.168.2.5185.162.88.26
                                                                Jan 25, 2021 19:24:06.403381109 CET2091149761185.162.88.26192.168.2.5
                                                                Jan 25, 2021 19:24:06.962107897 CET4976120911192.168.2.5185.162.88.26
                                                                Jan 25, 2021 19:24:07.012804985 CET2091149761185.162.88.26192.168.2.5
                                                                Jan 25, 2021 19:24:11.260816097 CET4976220911192.168.2.5185.162.88.26
                                                                Jan 25, 2021 19:24:11.311621904 CET2091149762185.162.88.26192.168.2.5
                                                                Jan 25, 2021 19:24:11.965183020 CET4976220911192.168.2.5185.162.88.26
                                                                Jan 25, 2021 19:24:12.015625000 CET2091149762185.162.88.26192.168.2.5
                                                                Jan 25, 2021 19:24:12.665815115 CET4976220911192.168.2.5185.162.88.26
                                                                Jan 25, 2021 19:24:12.716633081 CET2091149762185.162.88.26192.168.2.5
                                                                Jan 25, 2021 19:24:17.383920908 CET4976320911192.168.2.5185.162.88.26
                                                                Jan 25, 2021 19:24:17.434721947 CET2091149763185.162.88.26192.168.2.5
                                                                Jan 25, 2021 19:24:17.963021994 CET4976320911192.168.2.5185.162.88.26
                                                                Jan 25, 2021 19:24:18.013741016 CET2091149763185.162.88.26192.168.2.5

                                                                UDP Packets

                                                                TimestampSource PortDest PortSource IPDest IP
                                                                Jan 25, 2021 19:21:07.705065012 CET5959653192.168.2.58.8.8.8
                                                                Jan 25, 2021 19:21:07.752854109 CET53595968.8.8.8192.168.2.5
                                                                Jan 25, 2021 19:21:10.045734882 CET6529653192.168.2.58.8.8.8
                                                                Jan 25, 2021 19:21:10.104899883 CET53652968.8.8.8192.168.2.5
                                                                Jan 25, 2021 19:21:11.857464075 CET6318353192.168.2.58.8.8.8
                                                                Jan 25, 2021 19:21:11.905407906 CET53631838.8.8.8192.168.2.5
                                                                Jan 25, 2021 19:21:13.010660887 CET6015153192.168.2.58.8.8.8
                                                                Jan 25, 2021 19:21:13.058605909 CET53601518.8.8.8192.168.2.5
                                                                Jan 25, 2021 19:21:14.830909967 CET5696953192.168.2.58.8.8.8
                                                                Jan 25, 2021 19:21:14.878823996 CET53569698.8.8.8192.168.2.5
                                                                Jan 25, 2021 19:21:19.295212984 CET5516153192.168.2.58.8.8.8
                                                                Jan 25, 2021 19:21:19.349025965 CET53551618.8.8.8192.168.2.5
                                                                Jan 25, 2021 19:21:20.686103106 CET5475753192.168.2.58.8.8.8
                                                                Jan 25, 2021 19:21:20.734137058 CET53547578.8.8.8192.168.2.5
                                                                Jan 25, 2021 19:21:26.050913095 CET4999253192.168.2.58.8.8.8
                                                                Jan 25, 2021 19:21:26.111905098 CET53499928.8.8.8192.168.2.5
                                                                Jan 25, 2021 19:21:36.068780899 CET6007553192.168.2.58.8.8.8
                                                                Jan 25, 2021 19:21:36.119563103 CET53600758.8.8.8192.168.2.5
                                                                Jan 25, 2021 19:21:44.050039053 CET5501653192.168.2.58.8.8.8
                                                                Jan 25, 2021 19:21:44.113826990 CET53550168.8.8.8192.168.2.5
                                                                Jan 25, 2021 19:21:56.370292902 CET6434553192.168.2.58.8.8.8
                                                                Jan 25, 2021 19:21:56.429817915 CET53643458.8.8.8192.168.2.5
                                                                Jan 25, 2021 19:21:56.690957069 CET5712853192.168.2.58.8.8.8
                                                                Jan 25, 2021 19:21:56.778146982 CET53571288.8.8.8192.168.2.5
                                                                Jan 25, 2021 19:21:57.370459080 CET5479153192.168.2.58.8.8.8
                                                                Jan 25, 2021 19:21:57.434694052 CET53547918.8.8.8192.168.2.5
                                                                Jan 25, 2021 19:22:00.360069990 CET5046353192.168.2.58.8.8.8
                                                                Jan 25, 2021 19:22:00.419203043 CET53504638.8.8.8192.168.2.5
                                                                Jan 25, 2021 19:22:06.393126965 CET5039453192.168.2.58.8.8.8
                                                                Jan 25, 2021 19:22:06.441468000 CET53503948.8.8.8192.168.2.5
                                                                Jan 25, 2021 19:22:46.629046917 CET5853053192.168.2.58.8.8.8
                                                                Jan 25, 2021 19:22:46.679766893 CET53585308.8.8.8192.168.2.5
                                                                Jan 25, 2021 19:22:47.088706970 CET5381353192.168.2.58.8.8.8
                                                                Jan 25, 2021 19:22:47.148219109 CET53538138.8.8.8192.168.2.5
                                                                Jan 25, 2021 19:23:06.691986084 CET6373253192.168.2.58.8.8.8
                                                                Jan 25, 2021 19:23:06.749687910 CET53637328.8.8.8192.168.2.5
                                                                Jan 25, 2021 19:23:11.980174065 CET5734453192.168.2.58.8.8.8
                                                                Jan 25, 2021 19:23:12.041882992 CET53573448.8.8.8192.168.2.5
                                                                Jan 25, 2021 19:23:17.326075077 CET5445053192.168.2.58.8.8.8
                                                                Jan 25, 2021 19:23:17.382704973 CET53544508.8.8.8192.168.2.5
                                                                Jan 25, 2021 19:23:39.138854027 CET5926153192.168.2.58.8.8.8
                                                                Jan 25, 2021 19:23:39.198316097 CET53592618.8.8.8192.168.2.5
                                                                Jan 25, 2021 19:23:44.109695911 CET5715153192.168.2.58.8.8.8
                                                                Jan 25, 2021 19:23:44.166079044 CET53571518.8.8.8192.168.2.5
                                                                Jan 25, 2021 19:23:44.408252001 CET5941353192.168.2.58.8.8.8
                                                                Jan 25, 2021 19:23:44.464580059 CET53594138.8.8.8192.168.2.5
                                                                Jan 25, 2021 19:23:44.848939896 CET6051653192.168.2.58.8.8.8
                                                                Jan 25, 2021 19:23:44.910998106 CET53605168.8.8.8192.168.2.5
                                                                Jan 25, 2021 19:23:45.707304001 CET5164953192.168.2.58.8.8.8
                                                                Jan 25, 2021 19:23:45.755249023 CET53516498.8.8.8192.168.2.5
                                                                Jan 25, 2021 19:23:46.292948008 CET6508653192.168.2.58.8.8.8
                                                                Jan 25, 2021 19:23:46.349442959 CET53650868.8.8.8192.168.2.5
                                                                Jan 25, 2021 19:23:47.075252056 CET5643253192.168.2.58.8.8.8
                                                                Jan 25, 2021 19:23:47.131669044 CET53564328.8.8.8192.168.2.5
                                                                Jan 25, 2021 19:23:47.876236916 CET5292953192.168.2.58.8.8.8
                                                                Jan 25, 2021 19:23:47.924105883 CET53529298.8.8.8192.168.2.5
                                                                Jan 25, 2021 19:23:48.760588884 CET6431753192.168.2.58.8.8.8
                                                                Jan 25, 2021 19:23:48.808461905 CET53643178.8.8.8192.168.2.5
                                                                Jan 25, 2021 19:23:49.793334961 CET6100453192.168.2.58.8.8.8
                                                                Jan 25, 2021 19:23:49.849421024 CET53610048.8.8.8192.168.2.5
                                                                Jan 25, 2021 19:23:50.225378036 CET5689553192.168.2.58.8.8.8
                                                                Jan 25, 2021 19:23:50.281820059 CET53568958.8.8.8192.168.2.5
                                                                Jan 25, 2021 19:23:51.326426983 CET6237253192.168.2.58.8.8.8
                                                                Jan 25, 2021 19:23:51.374393940 CET53623728.8.8.8192.168.2.5
                                                                Jan 25, 2021 19:23:51.827725887 CET6151553192.168.2.58.8.8.8
                                                                Jan 25, 2021 19:23:51.884279966 CET53615158.8.8.8192.168.2.5
                                                                Jan 25, 2021 19:24:11.195023060 CET5667553192.168.2.58.8.8.8
                                                                Jan 25, 2021 19:24:11.256165981 CET53566758.8.8.8192.168.2.5
                                                                Jan 25, 2021 19:24:17.276366949 CET5717253192.168.2.58.8.8.8
                                                                Jan 25, 2021 19:24:17.334152937 CET53571728.8.8.8192.168.2.5
                                                                Jan 25, 2021 19:24:22.657061100 CET5526753192.168.2.58.8.8.8
                                                                Jan 25, 2021 19:24:22.713474035 CET53552678.8.8.8192.168.2.5
                                                                Jan 25, 2021 19:24:43.700970888 CET5096953192.168.2.58.8.8.8
                                                                Jan 25, 2021 19:24:43.759186983 CET53509698.8.8.8192.168.2.5
                                                                Jan 25, 2021 19:24:48.951416016 CET6436253192.168.2.58.8.8.8
                                                                Jan 25, 2021 19:24:48.999383926 CET53643628.8.8.8192.168.2.5
                                                                Jan 25, 2021 19:24:54.200112104 CET5476653192.168.2.58.8.8.8
                                                                Jan 25, 2021 19:24:54.261842012 CET53547668.8.8.8192.168.2.5

                                                                DNS Queries

                                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                                Jan 25, 2021 19:23:06.691986084 CET192.168.2.58.8.8.80x9f9fStandard query (0)fenixalec.ddns.netA (IP address)IN (0x0001)
                                                                Jan 25, 2021 19:23:11.980174065 CET192.168.2.58.8.8.80xf3bcStandard query (0)fenixalec.ddns.netA (IP address)IN (0x0001)
                                                                Jan 25, 2021 19:23:17.326075077 CET192.168.2.58.8.8.80x6505Standard query (0)fenixalec.ddns.netA (IP address)IN (0x0001)
                                                                Jan 25, 2021 19:23:39.138854027 CET192.168.2.58.8.8.80x9176Standard query (0)fenixalec.ddns.netA (IP address)IN (0x0001)
                                                                Jan 25, 2021 19:23:44.408252001 CET192.168.2.58.8.8.80xaa4dStandard query (0)fenixalec.ddns.netA (IP address)IN (0x0001)
                                                                Jan 25, 2021 19:23:49.793334961 CET192.168.2.58.8.8.80x4e54Standard query (0)fenixalec.ddns.netA (IP address)IN (0x0001)
                                                                Jan 25, 2021 19:24:11.195023060 CET192.168.2.58.8.8.80xe1abStandard query (0)fenixalec.ddns.netA (IP address)IN (0x0001)
                                                                Jan 25, 2021 19:24:17.276366949 CET192.168.2.58.8.8.80x1099Standard query (0)fenixalec.ddns.netA (IP address)IN (0x0001)
                                                                Jan 25, 2021 19:24:22.657061100 CET192.168.2.58.8.8.80xba53Standard query (0)fenixalec.ddns.netA (IP address)IN (0x0001)
                                                                Jan 25, 2021 19:24:43.700970888 CET192.168.2.58.8.8.80x46Standard query (0)fenixalec.ddns.netA (IP address)IN (0x0001)
                                                                Jan 25, 2021 19:24:48.951416016 CET192.168.2.58.8.8.80x4123Standard query (0)fenixalec.ddns.netA (IP address)IN (0x0001)
                                                                Jan 25, 2021 19:24:54.200112104 CET192.168.2.58.8.8.80xdb50Standard query (0)fenixalec.ddns.netA (IP address)IN (0x0001)

                                                                DNS Answers

                                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                                Jan 25, 2021 19:23:06.749687910 CET8.8.8.8192.168.2.50x9f9fNo error (0)fenixalec.ddns.net185.162.88.26A (IP address)IN (0x0001)
                                                                Jan 25, 2021 19:23:12.041882992 CET8.8.8.8192.168.2.50xf3bcNo error (0)fenixalec.ddns.net185.162.88.26A (IP address)IN (0x0001)
                                                                Jan 25, 2021 19:23:17.382704973 CET8.8.8.8192.168.2.50x6505No error (0)fenixalec.ddns.net185.162.88.26A (IP address)IN (0x0001)
                                                                Jan 25, 2021 19:23:39.198316097 CET8.8.8.8192.168.2.50x9176No error (0)fenixalec.ddns.net185.162.88.26A (IP address)IN (0x0001)
                                                                Jan 25, 2021 19:23:44.464580059 CET8.8.8.8192.168.2.50xaa4dNo error (0)fenixalec.ddns.net185.162.88.26A (IP address)IN (0x0001)
                                                                Jan 25, 2021 19:23:49.849421024 CET8.8.8.8192.168.2.50x4e54No error (0)fenixalec.ddns.net185.162.88.26A (IP address)IN (0x0001)
                                                                Jan 25, 2021 19:24:11.256165981 CET8.8.8.8192.168.2.50xe1abNo error (0)fenixalec.ddns.net185.162.88.26A (IP address)IN (0x0001)
                                                                Jan 25, 2021 19:24:17.334152937 CET8.8.8.8192.168.2.50x1099No error (0)fenixalec.ddns.net185.162.88.26A (IP address)IN (0x0001)
                                                                Jan 25, 2021 19:24:22.713474035 CET8.8.8.8192.168.2.50xba53No error (0)fenixalec.ddns.net185.162.88.26A (IP address)IN (0x0001)
                                                                Jan 25, 2021 19:24:43.759186983 CET8.8.8.8192.168.2.50x46No error (0)fenixalec.ddns.net185.162.88.26A (IP address)IN (0x0001)
                                                                Jan 25, 2021 19:24:48.999383926 CET8.8.8.8192.168.2.50x4123No error (0)fenixalec.ddns.net185.162.88.26A (IP address)IN (0x0001)
                                                                Jan 25, 2021 19:24:54.261842012 CET8.8.8.8192.168.2.50xdb50No error (0)fenixalec.ddns.net185.162.88.26A (IP address)IN (0x0001)

                                                                Code Manipulations

                                                                Statistics

                                                                Behavior

                                                                Click to jump to process

                                                                System Behavior

                                                                General

                                                                Start time:19:21:12
                                                                Start date:25/01/2021
                                                                Path:C:\Users\user\Desktop\PO#4018-308875.pdf.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:'C:\Users\user\Desktop\PO#4018-308875.pdf.exe'
                                                                Imagebase:0xe80000
                                                                File size:642048 bytes
                                                                MD5 hash:EA28F2D01808072DBE45804F514EF905
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:.Net C# or VB.NET
                                                                Yara matches:
                                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.356654386.0000000004301000.00000004.00000001.sdmp, Author: Florian Roth
                                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.356654386.0000000004301000.00000004.00000001.sdmp, Author: Joe Security
                                                                • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.356654386.0000000004301000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                Reputation:low

                                                                General

                                                                Start time:19:21:17
                                                                Start date:25/01/2021
                                                                Path:C:\Windows\SysWOW64\cmd.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:'cmd.exe' /c REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'kolkmjnhgf' /t REG_SZ /d 'C:\Users\user\AppData\Roaming\tgfcdsxazs.exe'
                                                                Imagebase:0xe30000
                                                                File size:232960 bytes
                                                                MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:high

                                                                General

                                                                Start time:19:21:17
                                                                Start date:25/01/2021
                                                                Path:C:\Windows\System32\conhost.exe
                                                                Wow64 process (32bit):false
                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                Imagebase:0x7ff7ecfc0000
                                                                File size:625664 bytes
                                                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:high

                                                                General

                                                                Start time:19:21:17
                                                                Start date:25/01/2021
                                                                Path:C:\Windows\SysWOW64\reg.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'kolkmjnhgf' /t REG_SZ /d 'C:\Users\user\AppData\Roaming\tgfcdsxazs.exe'
                                                                Imagebase:0x810000
                                                                File size:59392 bytes
                                                                MD5 hash:CEE2A7E57DF2A159A065A34913A055C2
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:high

                                                                General

                                                                Start time:19:22:07
                                                                Start date:25/01/2021
                                                                Path:C:\Users\user\AppData\Roaming\tgfcdsxazs.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:'C:\Users\user\AppData\Roaming\tgfcdsxazs.exe'
                                                                Imagebase:0xcd0000
                                                                File size:642048 bytes
                                                                MD5 hash:EA28F2D01808072DBE45804F514EF905
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:.Net C# or VB.NET
                                                                Yara matches:
                                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000014.00000002.696946485.0000000004B14000.00000004.00000001.sdmp, Author: Florian Roth
                                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000014.00000002.696946485.0000000004B14000.00000004.00000001.sdmp, Author: Joe Security
                                                                • Rule: NanoCore, Description: unknown, Source: 00000014.00000002.696946485.0000000004B14000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000014.00000002.696822953.0000000004A81000.00000004.00000001.sdmp, Author: Florian Roth
                                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000014.00000002.696822953.0000000004A81000.00000004.00000001.sdmp, Author: Joe Security
                                                                • Rule: NanoCore, Description: unknown, Source: 00000014.00000002.696822953.0000000004A81000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                Antivirus matches:
                                                                • Detection: 30%, Metadefender, Browse
                                                                • Detection: 67%, ReversingLabs
                                                                Reputation:low

                                                                General

                                                                Start time:19:22:43
                                                                Start date:25/01/2021
                                                                Path:C:\Users\user\AppData\Local\Temp\InstallUtil.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:C:\Users\user\AppData\Local\Temp\InstallUtil.exe
                                                                Imagebase:0x2c0000
                                                                File size:41064 bytes
                                                                MD5 hash:EFEC8C379D165E3F33B536739AEE26A3
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:.Net C# or VB.NET
                                                                Yara matches:
                                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000018.00000002.687092112.0000000000392000.00000040.00000001.sdmp, Author: Florian Roth
                                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000018.00000002.687092112.0000000000392000.00000040.00000001.sdmp, Author: Joe Security
                                                                • Rule: NanoCore, Description: unknown, Source: 00000018.00000002.687092112.0000000000392000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000018.00000002.697105456.0000000004F70000.00000004.00000001.sdmp, Author: Florian Roth
                                                                • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000018.00000002.697105456.0000000004F70000.00000004.00000001.sdmp, Author: Florian Roth
                                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000018.00000002.697259526.0000000005150000.00000004.00000001.sdmp, Author: Florian Roth
                                                                • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000018.00000002.697259526.0000000005150000.00000004.00000001.sdmp, Author: Florian Roth
                                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000018.00000002.697259526.0000000005150000.00000004.00000001.sdmp, Author: Joe Security
                                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000018.00000002.694427019.0000000003759000.00000004.00000001.sdmp, Author: Joe Security
                                                                • Rule: NanoCore, Description: unknown, Source: 00000018.00000002.694427019.0000000003759000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                Antivirus matches:
                                                                • Detection: 0%, Metadefender, Browse
                                                                • Detection: 0%, ReversingLabs
                                                                Reputation:moderate

                                                                Disassembly

                                                                Code Analysis

                                                                Reset < >